Topic01 Understanding DF
Topic01 Understanding DF
Digital forensics
– The application of computer science and investigative procedures for a legal
purpose
• involving the analysis of digital evidence after proper search authority, chain of custody,
use of validated tools, repeatability, reporting, and possible expert presentation.
– In October 2012, an ISO standard for digital forensics was ratified - ISO 27037
Information technology - Security techniques
Chain of custody
– Route the evidence takes from the time you find it until the case is closed or goes
to court
An evidence custody form helps you document what has been done
with the original evidence and its forensics copies
– Also called a chain-of-evidence form
Two types
– Single-evidence form
• Lists each piece of evidence on a separate page
– Multi-evidence form
Write your initials on tape to prove that evidence has not been
tampered with
Recommended steps
– Use standard forensic analysis techniques and procedures
– Use appropriate tools to extract all Web page URL information
– Contact the network firewall administrator and request a proxy server log
– Compare the data recovered from forensic analysis to the proxy server log
– Continue analyzing the computer’s disk drive data
Recommended steps
– Use the standard forensic analysis techniques
– Obtain an electronic copy of the suspect’s and victim’s e-mail folder or data
– For Web-based e-mail investigations, use tools such as FTK’s Internet Keyword
Search option to extract all related e-mail address information
– Examine header data of all messages of interest to the investigation
Guidelines (cont’d)
– Determine goal and scope of the investigation
– Initiate investigation after approval from management
Planning considerations
– Examine all e-mail of suspected employees
– Search Internet newsgroups or message boards
– Initiate physical surveillance
– Examine facility physical access logs for sensitive areas
Steps (cont’d)
– Place surveillance systems at key locations
– Discreetly gather any additional evidence
– Collect all log data from networks and e-mail servers
– Report regularly to management and corporate attorneys
– Review the investigation’s scope with management and corporate attorneys
Basic requirements
– A workstation running Windows XP or later
– A write-blocker device
– Digital forensics acquisition tool
– Digital forensics analysis tool
– Target drive to receive the source or suspect disk data
– Spare PATA or SATA ports
– USB ports